Attacks on the Exchange server flaws disclosed last week are being exploited by multiple threat actors and targeting a wide range of companies.
MiIke Hanley, the new GitHub CSO, sees myriad opportunities to have a positive influence on software security.
Attackers are using the four Microsoft Exchange zero days to target organizations from SMBs to government agencies and banks.
A Chinese attack group called Hafnium has exploited for zero days in Microsoft Exchange to steal data from inboxes and take control of compromised servers.
The ObliqueRAT malware is now being delivered through malicious image files hosted on compromised websites.
Attackers are exploiting four vulnerabilities in the Accellion File Transfer Appliance, weeks after patches were released.
Confidential threat intelligence sharing could help prevent the next large-scale intrusions, tech executives say.
Better visibility into ICS environments and increased cooperation between the private sector and government are key to defeating emerging threat actors.
The Silver Sparrow malware is targeting Macs, including those with the M1 chip, but is not delivering a payload.
Microsoft said the SolarWinds hackers were able to view and download some source code components for Azure, Exchange, and Intune.
Recent ESET research shows a staggering increase in the number of attacks against Remote Desktop Protocol in 2020--a clear sign of how effective the method is when breaching networks and compromising machines.
The White House promised to make cybersecurity a top priority and in its first month has begun responding to the massive SolarWinds hack and appointed several people with national security experience who have also previously worked on cybersecurity issues to the Biden Administration.
The Public Interest Registry launched the DNS Abuse Institute to coordinate efforts by domain registrars and internet registries to stomp out abuses of the domain name system.
The U.S. Department of Justice has indicted three North Koreans for allegedly hacking banks, private companies, and government agencies for many years.
Thanks to all the data breaches and security incidents over the last few years, attackers are sitting on a gold mine of valuable credentials information which they can use to launch credential-stuffing attacks against major Web services and other applications.